Imagine drafting the top IT security minds into a defense force to protect the nation's critical IT infrastructure. Defense Minister Jaak Aaviksoo and other Estonian leaders mull the possibility of instituting such a draft.
"There's a real threat out there." Cybersecurity Coordinator Howard Schmidt says. "But the threat sort of follows the way we build our defenses against it, and I think those things continue to move in parallel."
Not adequately implementing access management is a major process failure that led to the WikiLeaks leaks, the unauthorized access and downloading of 250,000 sensitive and classified diplomatic cables and other files.
An (ISC)2 survey suggests that a Commission on Cybersecurity for the 44th Presidency paper backs a government-run board to oversee IT security certifications, a point disputed by the report's author. Where does the truth lie?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.